Which type of attack is port scanning?
Which type of attack is port scanning?
What file would you find the information in and where?
You are a Administrator of Windows server. You want to find the port number for POP3. What file
would you find the information in and where?
Select the best answer.
which of the following are true statements that you would point out?
One of your junior administrator is concerned with Windows LM hashes and password cracking. In
your discussion with them, which of the following are true statements that you would point out?
Select the best answers.
which of these is the "exploit"?
In the following example, which of these is the “exploit”?
Today, Microsoft Corporation released a security notice. It detailed how a person could bring down
the Windows 2003 Server operating system, by sending malformed packets to it. They detailed
how this malicious process had been automated using basic scripting. Even worse, the new
automated method for bringing down the server has already been used to perform denial of
service attacks on many large commercial websites.
Select the best answer.
what type of general attack could compromise the data?
Assuring two systems that are using IPSec to protect traffic over the internet, what type of general
attack could compromise the data?
What is a Trojan Horse?
What is a Trojan Horse?
Which of the following commands accomplish this?
You want to use netcat to generate huge amount of useless network data continuously for various
performance testing between 2 hosts.
Which of the following commands accomplish this?
what would be one of the last steps that would be taken to ensure that the compromise is not traced back to th
After an attacker has successfully compromised a remote computer, what would be one of the last
steps that would be taken to ensure that the compromise is not traced back to the source of the
problem?
Which command would you execute to extract the Trojan to a standalone file?
You have hidden a Trojan file virus.exe inside another file readme.txt using NTFS streaming.
Which command would you execute to extract the Trojan to a standalone file?
What is the next step you would do?
You suspect that your Windows machine has been compromised with a Trojan virus. When you
run anti-virus software it does not pick of the Trojan. Next you run netstat command to look for
open ports and you notice a strange port 6666 open.
What is the next step you would do?